SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
How Technology Continues to 
Revolutionize Auditing
The Latest Tools and Their Impact on the 
Profession 
Agenda
• Introduction 
• Historical Timeline Internet and Auditors
• Technology’s Impact on Audit
• Innovation in Audit Research
• Evolution of Professional Networking
• Latest Technology Tools for Auditors
• Trends and the Future of Audit Technology
Then and Now
Auditors and Technology
• Early Adopters
– Innovators (into the new 
from Latin
– Interested in new 
methods & techniques
– Risk takers
– Forward thinking
– Gen X & Y
• Laggards
– Wait and see
– Cautious
– Hangs back
– Last group to try or 
adopt a new product
– Dislike change
Evolution of Web for Audit
Computers, Auditors and CAATTs
• The Evolution of CAATTs 80’s
– Around
– Through
– With
– EDP/IT Auditors
– Mainframe
• Audit Software 90’s
– Data extraction and analysis
– IT and non IT Auditors
– Windows
• The Millenium
– Software for all phases (planning, fieldwork, GRC)
– Cloud computing
Impact of Technology
• Computers and networks provide most of the 
information needed for auditing
• Auditors must use the computer as an 
auditing tool
• Auditors must also use the computer for audit 
administration
Impact of New Technology on the Profession
• Professional Standards
– 16 Global Technology Audit Guides have been released since January 2009
New Technologies and their Impact
• Mobile computing
• The Cloud or Internet based services
– SaaS (application based)
– PaaS (end to end SDLC)
– IaaS (servers, storage, network)
Social Media
• Social Media Defined
• The good the bad 
and the ugly
• What is the primary 
risk?
Technology as an Enabler
There is a wide array of specialized tools to 
support and enhance the entire spectrum of 
internal audit processes … for the most part 
(auditors) are not taking advantage of them
PwC 2010 Study on the State of the internal audit profession
Audit Software
Audit Software Categories
1. Data Analysis
2. Work Collaboration and Management
3. Risk Management
4. Continuous Controls Monitoring
5. Employee and Control Assessment 
6. Research and Benchmarking
Data Analysis for Auditors
Although internal auditors have been doing data analysis for more than 25 years, it 
has only recently started to become standard practice.
By our nature, most accountants and auditors are inclined to stick with what has 
worked in the past, rather than reach outside our comfort zone for an alternative 
that could help us accomplish more.
Do you reach outside your comfort zone?
Obstacles to Implementation
• Lack of an audit methodology
• Skill set gap
• Department size
• Cost implication 
• Complexity of the software
• Resistance in training auditors
• Failure of software to meet audit departments needs
• Failure to plan for use
Heard on the Street
• AICPA Survey on Top Technologies for 2011 #1 
Touch – screen technology  
• Faster LANs
• Voice Recognition
• Fiber Optics
• Private company GAAP IT Implementation
New Tools for Auditors
New Tools
• Sept, 2008….
– Any device, Any  time, Any 
where was born
– Users not interested in 
security, they want to 
trust, not to be trusted
– Any unprotected device 
connected to both the 
Internet & and company 
LAN poses a security risk
Other Technology Tools for Auditors
• Open Source Audit Software
• Continuous Controls Monitoring 
• Regulatory Compliance 
• Business Intelligence Software   
Audit Apps for iPhones/iPads
Imagine the Possibilities
• Access your computer from remote locations
• Collaborate using tools from the road
• Access audit programs, work papers and more 
from your mobile device
• Join Webinars and Webcasts for training
• Conduct or participate in virtual meetings with 
staff, clients etc.
Trends and their Impact
• Mobile devices and wireless computing
• Smart devices and malware
• Cloud sourcing and computing – security, governance 
and compliance
• Social media platform for communications
• Continuous risk and control assessment
• Reporting to the Board using SOTA technology
Skill Set for Future Auditors
• Multi‐disciplinary less accountants more 
business oriented
• Critical thinking skills 
• Strong communication skills
Future Predictions
• Standards will mandate use of technology tools for 
audit
• New generation of auditors must have the KSA to 
utilize technology
• If auditors and audit departments do not adapt to 
new technology they risk outsourcing
• Social networking will evolve to professional 
networking
• Tools will become more intuitive
• Knowledge hubs for audit tool, techniques and 
resources will consolidate and merge
Audit Programs in the Queue AuditNet®
• Auditor’s Guide to Cloud Computing ‐ Security Considerations.xls
• Cloud Matrix_Benefits & Risks.xls
• AuditNet® Guide to Social Networking
• AuditNet® Guide to Wireless Security 
• Business Continuity Planning – A Diagnostic Tool
• Forensic Document Examination
• Guidelines for Validation Testing
– AuditNet® is working to provide tools and resources to keep pace with new technology!
Conclusion
• I hope that I have provided 
you with some useful 
information that will stimulate 
your thought processes! 
• Any questions?
Contact Information
Jim Kaplan CIA, CFE editor@auditnet.org
http://www.auditnet.org
You Never Know What You Can Find on the ‘Net

Contenu connexe

En vedette

Internet server components
Internet server componentsInternet server components
Internet server components
Jay Patel
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
Tej Kiran
 
1 electronic data interchange (edi)
1   electronic data interchange (edi)1   electronic data interchange (edi)
1 electronic data interchange (edi)
gauravashq
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchange
Abhishek Nayak
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
Akash Varaiya
 

En vedette (20)

Internet server components
Internet server componentsInternet server components
Internet server components
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
E Marketing
E MarketingE Marketing
E Marketing
 
1 electronic data interchange (edi)
1   electronic data interchange (edi)1   electronic data interchange (edi)
1 electronic data interchange (edi)
 
Objectives of it act 2000
Objectives of it act 2000Objectives of it act 2000
Objectives of it act 2000
 
Electronic data interchange
Electronic data interchangeElectronic data interchange
Electronic data interchange
 
Android
AndroidAndroid
Android
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
M commerce
M commerceM commerce
M commerce
 
ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE ELECTRONIC DATA INTERCHANGE
ELECTRONIC DATA INTERCHANGE
 
Cyber law
Cyber lawCyber law
Cyber law
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Smart phone
Smart phoneSmart phone
Smart phone
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Big Risks Requires Big Data Thinking
Big Risks Requires Big Data ThinkingBig Risks Requires Big Data Thinking
Big Risks Requires Big Data Thinking
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 

Similaire à How technology continues to revolutionize auditing tmuc 2011

εξελιξη πληροφοριακων συστηματων στη διαχειρiση καινοτομιας
εξελιξη πληροφοριακων συστηματων στη διαχειρiση καινοτομιαςεξελιξη πληροφοριακων συστηματων στη διαχειρiση καινοτομιας
εξελιξη πληροφοριακων συστηματων στη διαχειρiση καινοτομιας
Manolis Vavalis
 
General presentation wl 20131015
General presentation wl 20131015General presentation wl 20131015
General presentation wl 20131015
Han64
 
The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrument
Jonah Kowall
 
"Digital transformation and innovations implementation. Architectural points ...
"Digital transformation and innovations implementation. Architectural points ..."Digital transformation and innovations implementation. Architectural points ...
"Digital transformation and innovations implementation. Architectural points ...
Fwdays
 

Similaire à How technology continues to revolutionize auditing tmuc 2011 (20)

εξελιξη πληροφοριακων συστηματων στη διαχειρiση καινοτομιας
εξελιξη πληροφοριακων συστηματων στη διαχειρiση καινοτομιαςεξελιξη πληροφοριακων συστηματων στη διαχειρiση καινοτομιας
εξελιξη πληροφοριακων συστηματων στη διαχειρiση καινοτομιας
 
General presentation wl 20131015
General presentation wl 20131015General presentation wl 20131015
General presentation wl 20131015
 
Operations Management - Process Technology
Operations Management - Process TechnologyOperations Management - Process Technology
Operations Management - Process Technology
 
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)A Case of Fusion Middleware  (IlOUG Tech Days, July 2013)
A Case of Fusion Middleware (IlOUG Tech Days, July 2013)
 
The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas The Prospect of IoT in the Oil & Gas
The Prospect of IoT in the Oil & Gas
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT Process
 
The differing ways to monitor and instrument
The differing ways to monitor and instrumentThe differing ways to monitor and instrument
The differing ways to monitor and instrument
 
Technology Management
Technology Management Technology Management
Technology Management
 
Technology management concept
Technology management conceptTechnology management concept
Technology management concept
 
Mis
MisMis
Mis
 
Key concepts of Technology Management
Key concepts of Technology ManagementKey concepts of Technology Management
Key concepts of Technology Management
 
Applause crowd testing meetup march 2015
Applause crowd testing meetup   march 2015Applause crowd testing meetup   march 2015
Applause crowd testing meetup march 2015
 
"Digital transformation and innovations implementation. Architectural points ...
"Digital transformation and innovations implementation. Architectural points ..."Digital transformation and innovations implementation. Architectural points ...
"Digital transformation and innovations implementation. Architectural points ...
 
How to apply machine learning into your CI/CD pipeline
How to apply machine learning into your CI/CD pipelineHow to apply machine learning into your CI/CD pipeline
How to apply machine learning into your CI/CD pipeline
 
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
 
00 introduction
00 introduction00 introduction
00 introduction
 
A case of Fusion Middleware - iLOUG 2013
A case of Fusion Middleware - iLOUG 2013A case of Fusion Middleware - iLOUG 2013
A case of Fusion Middleware - iLOUG 2013
 
How to get the most out of your existing DCS
How to get the most out of your existing DCSHow to get the most out of your existing DCS
How to get the most out of your existing DCS
 
Validation
ValidationValidation
Validation
 
VENKATESAN RESUME
VENKATESAN RESUMEVENKATESAN RESUME
VENKATESAN RESUME
 

Plus de Jim Kaplan CIA CFE

Plus de Jim Kaplan CIA CFE (20)

Enhanced fraud detection with data analytics
Enhanced fraud detection with data analyticsEnhanced fraud detection with data analytics
Enhanced fraud detection with data analytics
 
mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10) mplementing and Auditing GDPR Series (10 of 10)
mplementing and Auditing GDPR Series (10 of 10)
 
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
Touchstone Research for Internal Audit 2020 – A Look at the Now and Tomorrow ...
 
Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10) Implementing and Auditing GDPR Series (9 of 10)
Implementing and Auditing GDPR Series (9 of 10)
 
How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides How to detect fraud like a pro detective slides
How to detect fraud like a pro detective slides
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel How to get auditors performing basic analytics using excel
How to get auditors performing basic analytics using excel
 
Tracking down outliers
Tracking down outliersTracking down outliers
Tracking down outliers
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Implementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection RegulationImplementing and Auditing General Data Protection Regulation
Implementing and Auditing General Data Protection Regulation
 
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and FraudWhen is a Duplicate not a Duplicate? Detecting Errors and Fraud
When is a Duplicate not a Duplicate? Detecting Errors and Fraud
 
General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6 General Data Protection Regulation Webinar 6
General Data Protection Regulation Webinar 6
 
Focused agile audit planning using analytics
Focused agile audit planning using analyticsFocused agile audit planning using analytics
Focused agile audit planning using analytics
 
General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10General Data Protection Regulation for Auditors 5 of 10
General Data Protection Regulation for Auditors 5 of 10
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10) Implementing and Auditing GDPR Series (3 of 10)
Implementing and Auditing GDPR Series (3 of 10)
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

How technology continues to revolutionize auditing tmuc 2011